Reviews

Reverse Engineering Mac Malware

Reverse Engineering Mac Malware

This is the first part of a series of posts reflecting the Security B Sides presentation done by Sarah Edwards, experienced digital forensic analyst. The subject matter includes an overview of tools and methods which are applicable to reverse engineer the infections tailored for Mac. In particular, the presentation covers file types and instruments in the context of static analysis as well as such components of dynamic analysis as virtualization and application tracing, with some illustrations being provided along the way.

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 4 - Integrity Checkup with System Virginity Verifier

Mac OS X Rootkit

The Team T5 guys, TT (Sung-ting Tsai) and Nanika (Ming-chieh Pan), end their Black Hat presentation with the description of a trick to gain root permission on Mac OS X. Also, the experts provide the main takeaways that should be drawn from their research and introduce the System Virginity Verifier for Mac OS X (SVV-X) tool intended for comprehensive Mac integrity checkup.

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 3 - Benefits of the Host Privilege

Mac OS X Rootkit

This part of the Black Hat presentation by representatives of the Team T5 Research is dedicated to nuances of host privilege on Mac OS X and what can be done with it. In particular, the ways of granting such permissions to a normal user are highlighted. Additionally, the experts describe a method for bypassing the kernel module verification and show the process of loading kernel module in a demo.

A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet 2 - Detecting a Process Hidden by Rubilyn

Mac OS X Rootkit

Taiwanese researcher Sung-ting Tsai, aka TT, now delves deeper into the ins and outs of process hiding on Mac OS X, in particular through the use of the Rubilyn rootkit. The flip side of the coin, that is, detecting a process that had been hidden, is analyzed as well to show how user mode can be helpful in this context. For the purpose of visualization, there are demos demonstrating these tricks in action.

You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet

Mac OS X Rootkit

During their presentation at Black Hat Asia 2014, researchers from Team T5 Sung-ting Tsai and Ming-chieh Pan demonstrate some tricks for advanced process hiding in Mac OS X. In essence, this is activity powered by a rootkit, such as Rubilyn, which can make an arbitrary process not visible in the standard way. TT and Nanika also highlight methods for direct kernel task access and gaining root permission.

Bitdefender Antivirus for Mac review

Bitdefender Antivirus for Mac review

In the framework of the constantly expanding range of security tools for Mac OS X, Bitdefender Antivirus for Mac sports out-of-the-common protection efficiency attained without noticeable consumption of system resources.

Search